No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


S5700 SNMP Password Complexity Check

Publication Date:  2018-03-09 Views:  448 Downloads:  0

Issue Description

Customer have a global SNMP configuration across in their network which is not getting applied due to password strength check.
Awaiting update regarding the reported issue as customer unable to add the device under monitoring and unaware of the device health and other status.


Handling Process

Please see my attachment for the snmpv3 configuration guide and By default, the complexity check is enabled for SNMPv3 user passwords. If the password fails in the check, the configuration fails. You can run the snmp-agent usm-user password complexity-check disable command to disable the complexity check for SNMPv3 user passwords. It is recommended that the complexity check for SNMPv3 user passwords is enabled to ensure system security

Root Cause

Because after v200r002 version, the configuration of the SNMP protocol community have the request for the complexity of the password, request: password contains at least two characters, including: uppercase and lowercase letters, Numbers, special characters (not including question marks and Spaces).For pure digital or character groups are words suggest setting is not successful.Can use the command closing device password complexity of calibration, command: SNMP agent - community complexity - check the disable, the length of the links, you can set the password when, after v200r002 version also has the limit for password length, minimum 8 .Can set the password min - length number set the minimum length password.


1. we can diable the password complexity check .

2.we can set the password min-length .

3. test the snmp-agent usm-user password setting .